Benefits and Challenges of Using Open Educational Resources
secure data transfer and deletion from counting bloom filter in cloud computing.
1. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Secure Data Transfer and Deletion from Counting Bloom Filter in
Cloud Computing.
Abstract:
With the rapid development of cloud storage, an increasing number of data owners prefer to
outsource their data to the cloud server, which can greatly reduce the local storage overhead.
Because different cloud service providers offer distinct quality of data storage service, e.g.,
security, reliability, access speed and prices, cloud data transfer has become a fundamental
requirement of the data owner to change the cloud service providers. Hence, how to securely
migrate the data from one cloud to another and permanently delete the transferred data from the
original cloud becomes a primary concern of data owners. To solve this problem, we construct a
new counting Bloom filter-based scheme in this paper. The proposed scheme not only can
achieve secure data transfer but also can realize permanent data deletion. Additionally, the
proposed scheme can satisfy the public verifiability without requiring any trusted third party.
Finally, we also develop a simulation implementation that demonstrates the practicality and
efficiency of our proposal.
Key words — Cloud storage, Data deletion, Data transfer, Counting Bloom filter, Public
verifiability
Existing System:
we study the problems of secure data transfer and deletion in cloud storage, and focus on
realizing the public verifiability. Then we propose a counting Bloom filter-based scheme, which
not only can realize provable data transfer between two different clouds but also can achieve
publicly verifiable data deletion. If the original cloud server does not migrate or remove the data
honestly, the verifier (the data owner and the target cloud server) can detect these malicious
operations by verifying the returned transfer and deletion evidences. Moreover, our proposed
scheme does not need any Trusted third party (TTP), which is different from the existing
solutions. Furthermore, we prove that our new proposal can satisfy the desired design goals
through security analysis. Finally, the simulation experiments show that our new proposal is
efficient and practical.
Proposed System:
we aim to achieve verifiable data transfer between two different clouds and reliable data deletion
in cloud storage. Hence, three entities are included in our new construction,
In our scenario, the resource-constraint data owner might outsource his large-scale data to the
cloud server A to greatly reduce the local storage overhead. Besides, the data owner might
2. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
require the cloud A to move some data to the cloud B, or delete some data from the storage
medium. The cloud A and cloud B provide the data owner with cloud storage service. We
assume that the cloud A is the original cloud, which will be required to migrate some data to the
target cloud B, and remove the transferred data. However, the cloud A might not execute these
operations sincerely for economic reasons. because they belong to two different companies.
Hence, the two clouds will independently follow the protocol. Furthermore, we assume that the
target cloud B will not maliciously slander the original cloud A.
Advantages
1) Data confidentiality. The outsourced file may contain some private information that should be
kept secret. Hence, to protect the data confidentiality, the data owner needs to use secure
algorithms to encrypt the file before uploading it to the cloud server.
2) Data integrity. The cloud A might only migrate part of the data, or deliver some unrelated data
to the cloud B. Besides, the data might be polluted during the transfer process. Hence, the data
owner and the cloud B should be able to verify the transferred data integrity to guarantee that the
transferred data is intact.
3) Public verifiability. The cloud A may not move the data to the cloud B or delete the data
faithfully. So, the verifiability of the transfer and deletion results should be satisfied from the
data owner’s point of view.
System Architecture:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
3. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1